Overview
Application Timeline
Tuition
- Year 1
| Student categories | Study | |
|---|---|---|
| Full-time | Part-time | |
| England | £13,300 | N/A |
| Northern Ireland | £13,300 | N/A |
| Scotland | £13,300 | N/A |
| Wales | £13,300 | N/A |
| Channel Islands | £13,300 | N/A |
| Republic of Ireland | £13,300 | N/A |
| EU | £31,900 | N/A |
| International | £31,900 | N/A |
Requirements
Language requirements information is currently unavailable.
Modules
Modules is currently unavailable
Please check back later for updates.
About
Target Audience
This course is designed for students with a strong background in computer science, software engineering, or information technology.
Course Objectives
The course aims to broaden knowledge about the specific challenges in cyber security and explore possible solutions.
Key Areas of Focus
- Identity
- Trust and Reputation
- Cryptography
- Network Security
- Malware and Intrusion Detection
- Risk Management
- Development of High Assurance Systems
Career Preparation
This course prepares students for careers in industry or government by providing a broad education in cyber security, enabling them to make informed and principled decisions.
...
Subject Area Information
Computer and Information Security is a critical and expansive field that focuses on protecting computer systems, networks, and data from cyber threats and unauthorized access. This discipline encompasses a wide range of subjects, skills, and modules designed to equip students with the knowledge and expertise needed to safeguard digital information in various environments.
1. Introduction to Cybersecurity
2. Network Security
3. Cryptography
4. Ethical Hacking and Penetration Testing
5. Information Security Management
6. Secure Software Development
7. Digital Forensics
- Technical Proficiency
- Analytical Thinking
- Problem-Solving
- Ethical Judgment
- Communication
Career
Graduates of computer and information security programs can pursue a variety of careers, including roles that protect organizations from cyber threats and ensure the integrity of digital information.
Information Security Analyst
Protects an organization's computer systems and networks by monitoring for security breaches and implementing security measures.
Network Security Engineer
Designs and maintains secure network infrastructures to protect data during transmission.
Cybersecurity Consultant
Provides expert advice to organizations on how to improve their cybersecurity posture.
Penetration Tester (Ethical Hacker)
Conducts authorized simulated attacks to identify and fix security vulnerabilities.
Digital Forensics Investigator
Analyzes digital evidence to investigate cybercrimes and support legal proceedings.
Security Software Developer
Creates secure software applications and integrates security into the development process.
Chief Information Security Officer (CISO)
Oversees an organization's information security strategy and ensures compliance with security policies and regulations.
Similar courses
Contact
Enhance your academic journey with the help from our experts.
Contact
Enhance your academic journey with the help from our experts.

